Você está na página 1de 47

1 IGRP supports a feature that allows traffic to be distributed among up to 6 (4 default) paths to provide greater overall throughput and

reliability !hat is this called" A. unequal-cost load balancing B. equal-cost load balancing C. proportionate load balancing D. low cost load balancing Ans A An unequal-cost load balancing is used to provide alternate paths for data distribution on an internetwork. Cisco developed this method to use unused or under utilized links to increase bandwidth and network availability. # IGRP uses flash updates$ poison reverse updates$ hold down times$ and split hori%on &ow often does it broadcast its routing table updates" A. ! seconds B. "! seconds C. #! seconds D. $% seconds Ans A ' (he command )show IP protocol) displays which information" A. routing timers B. network information C. contents of the &' routing table D. information about all known network and subnetworks Ans A ( B )show &' protocol) displays routing timers and network information. )show &' route) displays the routing table with information about all known networks and subnetworks. 4 !hen using RIP$ routing updates are broadcast every **** seconds A. #!

B. "! C. *! D. ! Ans+ A ,ovell-s .&' updates routing tables every *! seconds/ Apple-s .01' is every "! seconds/ routers A.' every *! seconds/ D2Cnet hosts and &3.' signal every "% seconds/ and Banyan 4&,25 signals every ! seconds. + ,n autonomous system can only e-ist if all routers in that system meet which criteria" A. interconnected B. run the same routing protocol C. assigned same autonomous system number D. run &3.' only 2. run .&' only Ans A/B (C An autonomous system is a set of routers and networks under the same administration. 2ach router must be interconnected/ run the same routing protocol/ and assigned the same autonomous system number. 0he network &nformation Center 6,&C7 assigns a unique autonomous system number to enterprises. 6 , default route is analogous to a ********* A. default gateway B. static route C. dynamic route D. one-way route Ans+ A A default route is analogous to a default gateway. &t is used to reduce the length of routing tables and to provide complete routing capabilities when a router might not know the routes to all other networks. . Routers can learn about destinations through static routes$ default$ or dynamic routing /y default$ a router will use information derived from ********** A. &3.' B. .&'

C. &' D. 0C' Ans A 0he quality of information is rated+ Connected interface ! 5tatic route " &3.' "!! .&' "8! 9nknown 8%% 0he lower the value/ the more reliable the source with 8%% signifying information that the router will ignore. 5o/ the router will use &3.'/ rated at "!!/ before .&'/ rated at "8!. 0 1ou are logged into a router$ what command would show you the IP addresses of routers connected to you" A. show cdp neighbors detail B. show run C. show neighbors D. show cdp Ans A 2 ,s a system administrator$ you perform an e-tended ping at the privileged 3435 prompt ,s part of the display$ you see )6et 78 bit in IP header" 9yes: ;) !hat would happen if you answered no at the prompt A. 0his lets the router fragment the packet. B. &t tells the router not to fragment the packet. C. 0his lets the router direct the packet to the destination it finds in its routing table. D. &t tell the router to send the packet to the ne:t hop router. Ans A )5et D; bit in &' header<) is a response to an e:tended ping at the router. &f you answer yes 6the default7 the router will not fragment the packet. &f you answer no/ the router will fragment the packet. 1< 1ou have typed )ping) 1.# 16 1<1 1 and get the following display;

(ype escape se=uence to abort 6ending +$ 1<<>byte I5?P 3choes to 1.# 16 1<1 1$ timeout is # seconds; @@@@ !hat does the ) ) signify" A. 0hat one message timed out. B. 0hat all messages were successful. C. 0hat one message was successful. D. 0hat one message completed in under the allotted timeframe. Ans A 0he possible responses from the ping command are+ = 5uccessful receipt of an echo reply. . 0imed out waiting for a reply 9 Destination unreachable C Congestion-e:perienced packet & 'ing interrupted < 'acket type unknown ( 'acket 00> e:ceeded 11 !hich command$ that is used to test address configuration$ uses (ime>(o>Aive (((A) values to generate messages from each router A. trace B. ping C. telnet D. bootp Ans+ A 0he Cisco &?5 2@2C command )trace AprotocolB AdestinationB) is used to discover routes that packets will travel to their destination hosts. 0race uses 00> 60ime to >ive7 values to report destination route information. 1# !hat does the command )IP name>server #++ #++ #++ #++) accomplish" A. &t sets the domain name lookup to be a local broadcast. B. 0his is an illegal command. C. &t disables domain name lookup. D. 0he command is now defunct and has been replaced by )&' server-name ip any)

Ans A By default D,5 is enabled on a router with a server address of 8%%.8%%.8%%.8%%/ which provides for a local broadcast. 1' ,s a system administrator$ you need to provide your routers with a 7omain Bame 6ystem (7B6) server &ow many 7B6 servers can you specify with one command" A. * B. " C. 8 D. $ Ans A Cou can only specify si: name servers in one command. 0he synta: is )&' name-server server-address" AA server-address8 B...server-address*B. Cou must also enable D,5. 14 &ow would you configure one host name that points to two IP addresses" A. &' host Dacob ".!.!.% 8.!.!.E B. &' Dacob ".!.!.% 8.!.!.E C. &' host Dacob ".!.!.% D. &' host duplicate )all) Ans A 0he correct synta: is &' host name A 0C'-port-number B address A address B..... 5o/ )&' host '"." ".!.!.% 8.!.!.E) is the correct choice. )&' host Dacob ".!.!.%) only points the host name Dacob to one &' address--".!.!.%. 1+ (he following selections show the command prompt and the configuration of the IP networC masC !hich two are correct" A. .outerFterm &' netmask-format G bitcount H decimal H he:adecimal I B. .outer6config-if7F&' netmask-format G bitcount H decimal H he:adecimal I C. .outer6config-if7Fnetmask-format G bitcount H decimal H he:adecimal I D. .outerFip netmask-format G bitcount H decimal H he:adecimal I Ans A ( B .outerFterm &' netmask-format G bitcount H

decimal H he:adecimal I and .outer6config-if7F&' netmask-format G bitcount H decimal H he:adecimal I are correct. Cou can configure the mask for the current session and you can configure it for a specific line. 16 !hen configuring the subnet masC for an IP address$ which formats can be used", dotted>decimal B. Je:adecimal C. Bit-count D. ?ctal 2. Binary Ans A/ B (C 1. 1ou are given the following address; 1+' +< 6 #.D#+ 7etermine the subnet masC$ address class$ subnet address$ and broadcast address A. 8%%.8%%.8%%."8E/ B/"%#.%!.*.!/ "%#.%!.*."8K B. 8%%.8%%.8%%."8E/ C/"%#.%!.*.!/ "%#.%!.*."8K C. 8%%.8%%.8%%."8E/ C/"%#.%!.*."8K/ "%#.%!.*.! D. 8%%.8%%.8%%.88$/ C/"%#.%!.*.!/ "%#.%!.*."8K Ans A 10 1ou are given the following address; 1#0 16 '# 1'D'< 7etermine the subnet masC$ address class$ subnet address$ and broadcast address A. 8%%.8%%.8%%.8%8/ B/"8E."*.#8."8/ "8E."*.#8."% B. 8%%.8%%.8%%.8%8/ C/"8E."*.#8."8/ "8E."*.#8."% C. 8%%.8%%.8%%.8%8/ B/"8E."*.#8."%/ "8E."*.#8."8 D. 8%%.8%%.8%%.8$E/ B/"8E."*.#8."8/ "8E."*.#8."% Ans A 12 1ou are given the following address; 1+ 16 12' 6D#1 7etermine the subnet masC$ address class$ subnet address$ and broadcast address A. 8%%.8%%.8$E.!/ A/ "%."*." B. 8%%.8%%.8$E.!/ B/ "%."*." C. 8%%.8%%.8$E.!/ A/ "%."*." D. 8%%.8%%.8$8.!/ A/ "%."*." 8.!/ "%."*." .8%% 8.!/ "%."*." .8%% .8%%/ "$."%." 8.! 8.!/ "%."*." .8%%

Ans A #< 1ou have an IP host address of #<1 ### + 1#1 and a subnet masC of #++ #++ #++ #40 !hat is the broadcast address" A. 8!".888.%."8K B. 8!".888.%."8! C. 8!".888.%."8" D. 8!".888.%."88 Ans A 0he easiest way to calculate this is to subtract 8%%.8%%.8%%.8$E 6subnet mask7 from 8%%.8%%.8%%.8%%/ this equals K. Convert the address 8!".888.%."8" to binary--""!!"!!" ""!""""! !!!!!"!" !""""!!". Convert the mask 8%%.8%%.8%%.8$E to binary--"""""""" """""""" """""""" """""!!!. A,D them together to get+ ""!!"!!" ""!""""! !!!!!"!" !""""!!! or 8!".888.%."8!. 8!".888.%."8! is the subnet address/ add K to this address for 8!".888.%."8K or the broadcast address. 8!".888.%."8" through 8!".888.%."8* are the valid host addresses. #1 Given the address 1.# 16 # 1#< and the subnet masC of #++ #++ #++ < &ow many hosts are available" A. 8%$ B. %"! C. "8* D. "*/#K8 Ans A "K8."*.8 "8! is a standard Class B address with a subnet mask that allows 8%$ hosts. Cou are a network administrator and have been assigned the &' address of 8!".888.%.!. Cou need to have 8! subnets with % hosts per subnet. 0he subnet mask is 8%%.8%%.8%%.8$E. ## !hich addresses are valid host addresses" A. 8!".888.%."K B. 8!".888.%."E C. 8!".888.%."* D. 8!".888.%." 2. 8!".888.%.#"

Ans A/B ( D 5ubnet addresses in this situation are all in multiples of E. &n this e:ample/ 8!".888.%."* is the subnet/ 8!".88.%.#" is the broadcast address. 0he rest are valid host &Ds on subnet 8!".888.%."*. #' 1ou are a networC administrator and have been assigned the IP address of #<1 ### + < 1ou need to have #< subnets with + hosts per subnet !hat subnet masC will you use" A. 8%%.8%%.8%%.8$E B. 8%%.8%%.8%%."8E C. 8%%.8%%.8%%." 8 D. 8%%.8%%.8%%.8$! Ans A By borrowing % bits from the last octet/ you can. have #! subnets. &f you borrowed only $ bits you could only have "$ subnets. 0he formula is 68 to the power of n7-8. By borrowing $ bits/ you have 68:8:8:87-8L"$. By borrowing % bits/ you have 68:8:8:8:87-8L#!. 0o get 8! subnets/ you would need to borrow % bits so the subnet mask would be 8%%.8%%.8%%.8$E. #4 1ou are given the IP address of 1.# 16 # 16< with a subnet masC of #++ #++ < < !hat is the networC address in binary" A. "!"!""!! !!!"!!!! B. !!!!!!"! "!"!!!!! C. "!"!""!! !!!!!!!! D. """!!!!! """"!!!! Ans+ A 0o find the network address/ convert the &' address to binary--"!"!""!! !!!"!!!!! !!!!!!"! "!"!!!!!--then A,Ded it with the subnet mask--"""""""" """""""" !!!!!!!! !!!!!!!!. 0he rest is "!"!""!! !!!"!!!! !!!!!!!! !!!!!!!!/ which is "K8."*.!.! in decimal. 0he first octet rule states that the class of an address can be determined by the numerical value of the first octet. #+ !hich addresses are IB5ERR35(A1 paired with their class" A. "8E to " "/ Class B B. " 8 to 88# Class B C. "8E to " "/ Class C

D. " 8 to 88#/ Class C Ans B ( C Address classes are+ " to "8*/ Class AM "8E to " "/ Class B/ " 8 to 88#/ Class CM 88$ to 8# / Class DM and 8$! to 8%%/ Class 2. 0he first octet rule states that the class of an address can be determined by the numerical value of the first octet. #6 !hich addresses are IB5ERR35(A1 paired with their class" A. " to "8*/ Class A B. "8E to " "/ Class A C. " to "8*/ Class B D. "8E to " "/ Class B Ans+B ( C. Address classes are+ " to "8*/ Class AM "8E to " "/ Class B/ " 8 to 88#/ Class CM 88$ to 8# / Class DM and 8$! to 8%%/ Class 2. 0he first octet rule states that the class of an address can be determined by the numerical value of the first octet. #. !hich addresses are IB5ERR35(A1 paired with their class" A. 8$! - 8%%/ Class D B. 8$! - 8%%/ Class 2 C. 88$ - 8# / Class D D. 88$ - 8# / Class 2 Ans A ( D Address classes are+ " to "8*/ Class AM "8E to " "/ Class B/ " 8 to 88#/ Class CM 88$ to 8# / Class DM and 8$! to 8%%/ Class 2. #0 !hich IP ,ddress 5lass is IB5ERR35(A1 paired with its range of networC numbers" A. Class A addresses include " 8.!.!.! through 88#.8%%.8%%.! B. Class A addresses include ".!.!.! through "8*.!.!.! C. Class B addresses include "8E.!.!.! through " ".8%%.!.! D. Class C addresses include " 8.!.!.! through 88#.8%%.8%%.! 2. Class D addresses include 88$.!.!.! through 8# .8%%.8%%.! Ans A Class A addresses include ".!.!.! through

"8*.!.!.! Class B addresses include "8E.!.!.! through " ".8%%.!.! Class C addresses include " 8.!.!.! through 88#.8%%.8%%.! Class D addresses include 88$.!.!.! through 8# .8%%.8%%.! #2 !hich IP ,ddress 5lass can have 16 million subnets but support #+4 hosts" A. Class C B. Class A C. Class B D. Class D Ans A 'ossible 5ubnets &' Address Class 'ossible Josts 8%$ A "*1. *$N B *$N "*1 C 8%$

'< !hich IP ,ddress 5lass can have 64$<<< subnets with 64$<<< hosts per subnet" A. Class B B. Class A C. Class C D. Class D Ans A &' Address Class 'ossible 5ubnets 'ossible Josts 8%$ A "*1 *$N B *$N "*1 C 8%$ '1 (here are two processes to pair ?,5 address with IP addresses !hich process finds an IP address from a ?,5 address" A. .A.' B. A.' C. .&' D. &3.'

Ans A A.' 6Address .esolution 'rotocol7 maps an &' address to the 1AC address/ .A.' 6.everse Address .esolution 'rotocol7 maps the 1AC address to the &' address. A.' and .A.' work at the internet layer of the &nternet 1odel or the network layer of the ?5& model. '# !hen the router runs out of buffer space$ this is called ******** A. 5ource Ouench B. .edirect C. &nformation .equest D. >ow 1emory Ans A 5ource quench is the process where the destination router/ or end internetworking device will )quench) the date from the )source)/ or the source router. 0his usually happens when the destination router runs out of buffer space to process packets.

'' !hich protocol carries messages such as destination Fnreachable$ (ime 3-ceeded$ Parameter Problem$ 6ource Guench$ Redirect$ 3cho$ 3cho Reply$ (imestamp$ Information Re=uest$ Information Reply$ ,ddress Re=uest$ and ,ddress Reply" A. &C1' B. 9D' C. 0C' D. 0;0' 2. ;0' Ans A &C1' 6&nternet Control 1essage 'rotocol7 is a network layer internet protocol described in .;C F K 8. &C1' reports &' packet information such as destination 9nreachable/ 0ime 2:ceeded/ 'arameter 'roblem/ 5ource Ouench/ .edirect/ 2cho/ 2cho .eply/ 0imestamp/ &nformation .equest/ &nformation .eply/ Address .equest/ and Address .eply.

'4 (wo of the protocols that can be carried in the Protocol field of an IP pacCet are" A. 0C' B. 9D' C. ;0' D. 0;0' Ans A ( B 0he following are the fields in an &' segment/ their length/ and their definitions+ 42.5 64ersion number - "* bits7 J>2, 6,umber of #8-bit words in the header - $ bits7 0ype of 5erver 6Jow the datagram should be handled - #8 bits7 0otal >ength 60otal length of header and data - #8 bits7 &dentification 6'rovide fragmentation of datagrams to allow different 109s in the internet - $ bits7 ;lags 6'rovide fragmentation of datagrams to allow different 109s in the internet - $ bits7 ;rag ?ffset 6'rovide fragmentation of datagrams to allow different 109s in the internet - * bits7 00> 60ime-0o->ive - * bits7 'rotocol 69pperlayer protocol sending the datagram - "* bits7 Jeader Checksum 7&ntegrity check on the header - "* bits7 5ource &' Address 6#8 bits7 Destination &' Address 6#8 bits7 &' ?ptions 6network testing/ debugging/ security and others - $ bits7 Data 6$ bits7. '+ !here would networC testing be included in an IP pacCet" A. &' ?ptions field B. &dentification field C. 0ype of 5ervice field D. .eservation field Ans A 0he following are the fields in an &' segment/ their length/ and their definitions+ 42.5 64ersion number - "* bits7 J>2, 6,umber of #8-bit words in the header - $ bits7 0ype of 5erver 6Jow the datagram should be handled - #8 bits7 0otal >ength 60otal length of header and data - #8 bits7 &dentification 6'rovide fragmentation of datagrams to allow

different 109s in the internet - $ bits7 ;lags 6'rovide fragmentation of datagrams to allow different 109s in the internet - $ bits7 ;rag ?ffset 6'rovide fragmentation of datagrams to allow different 109s in the internet - * bits7 00> 60ime-0o->ive - * bits7 'rotocol 69pperlayer protocol sending the datagram - "* bits7 Jeader Checksum 7&ntegrity check on the header - "* bits7 5ource &' Address 6#8 bits7 Destination &' Address 6#8 bits7 &' ?ptions 6network testing/ debugging/ security and others - $ bits7 Data 6$ bits7. '6 !hat field tells the Internet layer how to handle an IP pacCet" A. 0ype of 5ervice B. &dentification C. ;lags D. ;rag ?ffset Ans A 0he following are the fields in an &' segment/ their length/ and their definitions+ 42.5 64ersion number - "* bits7 J>2, 6,umber of #8-bit words in the header - $ bits7 0ype of 5erver 6Jow the datagram should be handled - #8 bits7 0otal >ength 60otal length of header and data - #8 bits7 &dentification 6'rovide fragmentation of datagrams to allow different 109s in the internet - $ bits7 ;lags 6'rovide fragmentation of datagrams to allow different 109s in the internet - $ bits7 ;rag ?ffset 6'rovide fragmentation of datagrams to allow different 109s in the internet - * bits7 00> 60ime-0o->ive - * bits7 'rotocol 69pperlayer protocol sending the datagram - "* bits7 Jeader Checksum 7&ntegrity check on the header - "* bits7 5ource &' Address 6#8 bits7 Destination &' Address 6#8 bits7 &' ?ptions 6network testing/ debugging/ security and others - $ bits7 Data 6$ bits7. '. !hich fields of an IP pacCet provide for fragmentation of datagrams to allow differing ?(Fs in the internet"

A. &dentification B. ;lags C. ;rag ?ffset D. 0ype of 5ervice 2. 0otal >ength Ans A/ B ( C 0he following are the fields in an &' segment/ their length/ and their definitions+ 42.5 64ersion number - "* bits7 J>2, 6,umber of #8-bit words in the header - $ bits7 0ype of 5erver 6Jow the datagram should be handled - #8 bits7 0otal >ength 60otal length of header and data - #8 bits7 &dentification 6'rovide fragmentation of datagrams to allow different 109s in the internet - $ bits7 ;lags 6'rovide fragmentation of datagrams to allow different 109s in the internet - $ bits7 ;rag ?ffset 6'rovide fragmentation of datagrams to allow different 109s in the internet - * bits7 00> 60ime-0o->ive - * bits7 'rotocol 69pperlayer protocol sending the datagram - "* bits7 Jeader Checksum 7&ntegrity check on the header - "* bits7 5ource &' Address 6#8 bits7 Destination &' Address 6#8 bits7 &' ?ptions 6network testing/ debugging/ security and others - $ bits7 Data 6$ bits7. '0 !hich processes does (5P$ but not F7P$ use" A. Pindowing B. Acknowledgements C. 5ource 'ort D. Destination 'ort Ans A ( B 9D' 69ser Datagram 'rotocol7 does not use sequence or acknowledgement fields in transmission. 9D' is a connectionless and unreliable protocol/ since there is no delivery checking mechanism in the 9D' data format. '2 !hat is the F7P datagram format" A. 5ource 'ort - "* bits/ Destination 'ort - "* bits/ >ength - "* Bits/ Checksum - "* bits/ Data

B. Destination 'ort - "* bits/ 5ource 'ort - "* bits/ >ength - "* Bits/ Checksum - "* bits/ Data C. 5ource 'ort - "* bits/ Destination 'ort - "* bits/ Checksum - "* Bits/ >ength - "* bits/ Data D. 5ource 'ort - E bits/ Destination 'ort - E bits/ >ength -E Bits/ Checksum - E bits/ Data Ans A 0he 9D' format for a segment is as follows+ 5ource 'ort "* bits Destination 'ort "* bits >ength "* bits Checksum "* bits Data :: bits 4< !hat is the function of 77R on 5isco routers" A. DD. is dial--on-demand routing. &t provides a continuous >A, only connection. B. DD. is dial-on-demand routing. &t provides routing for high volume traffic. C. DD. is dial--on-demand routing. &t provides a continuous PA, connection. D. DD. is dial-on-demand routing. &t provides routing for low volume and periodic traffic. Answer+ D DD. is dial-on-demand routing. &t provides routing for low volume and periodic traffic. &t initiates a call to a remote site when there is traffic to transmit. 41 !hat are the two types of access lists that can be configured on a 5isco router" A. 5tandard B. 2:tended C. ;iltering D. 'acket Ans+ A ( B 0he access lists are standard and e:tended. 5tandard access lists for &' check the source address of packets that could be routed. 2:tended access lists can check the source and destination packet plus check for specific protocols/ port numbers/ etc. 4# !hen using access lists$ what does a 5isco router checC first" A. 0o see if the packet is routable or bridgeable B. 0he destination address

C. 0he source address D. 0he packet contents Ans A 0he first thing checked is to see if the packet is routable or bridgeable. &f it is not/ the packet will be dropped. 4' &ow many access lists are allowed per interface" A. ?ne per port/ per protocol B. 0wo per port/ per protocol C. 9nlimited D. .outer interface Q" per port. Ans+ A ?nly one access list is allowed per interface. An access list must have conditions that test true for all packets that use the access list. 44 !hat do the following commands accomplish" access>list 1 deny 1.# 16 4 < < < < #++ access>list 1 permit any interface ethernet < IP access>group 1 out

A. 0his will block traffic from subnet "K8."*.$.! and allow all other traffic. B. 0his will allow traffic from subnet "K8."*.$.! and block all other traffic. C. All traffic is allowed. D. All traffic is blocked. Ans+ A 0his will block traffic from subnet "K8."*.$.! and allow all other traffic. 0he first statement )access-list " deny "K8."*.$.! !.!.!.8%%) will deny access to the subnet "K8."*.$.!. 4+ !hat do the following statements in an e-tended access list accomplish" access>list 1<1 deny (5P 1.# 16 4 < < < < #++ 1.# 16 ' < < < < #++ e= #1 access>list 1<1 deny (5P 1.# 16 4 < < < < #++ 1.# 16 ' < < < < #++ e= #< access>list 1<1 permit (5P 1.# 16 4 < < < < #++ < < < < #++ #++ #++ #++

A. 0his will block ftp traffic. B. 0his will block http traffic. C. 0his will permit ftp traffic. D. 0his will permit tftp traffic. Ans+ A 0his will block ftp traffic since ftp uses ports 8! and 8". 46 ,ccess lists are numbered !hich of the following ranges could be used for an IP access list" A. *!! - * B. "!! - " C. " D. E!! - E 2. "!!! - "! Answer+ B ( C Apple0alk access lists use numbers in the *!! - * range. &' uses " for standard access lists or "!!-" for e:tended access lists. &'@ uses E!! - E or !! for e:tended access lists. &'@ 5A' filters use "!!! - "! . 4. 5isco routers use wildcard masCing to identify how to checC or ignore corresponding IP address bits !hat does setting a wildcard masC bit to < cause the router to do" A. &t tells the router to check the corresponding bit value. B. &t tells the router to ignore the corresponding bit value. C. &t tells the router to check its alternate routing list. D. &t tells the router to use its primary routing list. Ans A &t tells the router to check the corresponding bit value. 40 1ou are a system administrator and you want to deny access to a group of computers with addresses 1.# '< 16 < to 1.# '< '1 < !hich wildcard masC would you use" A. !.!."%.8%% B. !.!.8%%.8%% C. !.!.#".8%% D. !.!."8K.8%% 2. !.!.8%%.8%%

Ans+ A !.!."%.8%% will check the last "# bits of an address so that computers "K8.#!."*.! to "K8.#!.#".! will be denied access. !.!.#".8%% would check the last * binary digits and deny access to addresses "K8.#!.#8.! to "K8.#!.*#.!. !.!."8K.8%% would check the last K binary digits and deny access to addresses "K8.#!.*$.! to "K8.#!."8K.!. !.!.8%%.8%% would deny "K8.#!.!.! to "K8.#!.8%$.!. &f you write decimal "% in binary/ you have !!!""""/ the "-s tell the router to ignore address with these bits setM !-s tell the router to check the bits. 0he third octet for "K8.#!."*.! is !!!"!!!!. 0he third octet for "K8.#!.#".! would be !!!""""". 5o/ traffic from these addresses would be denied. 42 In order to limit the =uantity of numbers that a system administrator has to enter$ 5isco can use which abbreviation to indicate < < < <" A. host B. any C. all D. include Ans+ A Cisco uses host to specify !.!.!.!. 0his tells the router to check all. Cisco uses any to specify 8%%.8%%.8%%.8%%. 0his tells the router to ignore all and permit any address to use an access list test. +< !hat do the following commands accomplish" access>list 1 permit 1.# 16 < < < < #++ #++ interface ethernet < IP access>group 1 out interface ethernet 1 IP access>group 1 out A. ?nly traffic from the source network "K8."*.!.! will be blocked. B. ?nly traffic from the source network "K8."*.!.! will be forwarded. ,on-"K8."*.!.! network traffic is blocked. C. ,on-"K8."*.!.! traffic will be forwarded. D. All traffic will be forwarded. Ans+ B ?nly traffic from the source network "K8."*.!.! will be forwarded. ,on-"K8."*.!.! network traffic is blocked. 0he wildcard mask !.!.8%%.8%% tells the router to check the first 8 octets and to ignore the last 8 octets.

+1 !hen using access lists$ it is important where those access lists are placed !hich statement best describes access list placement" A. 'ut standard access lists as near the destination as possible. 'ut e:tended access lists as close to the source as possible. B. 'ut e:tended access lists as near the destination as possible. 'ut standard access lists as close to the source as possible. C. &t isn-t import where access lists are placed since the router will read and cache the whole list. D. 'ut access lists as close to corporate headquarters as possible. Ans A 'ut standard access lists as near the destination as possible. 'ut e:tended access lists as close to the source as possible. 5tandard access lists don-t specify the destination address. +# ,s the system administrator$ you enter the following commands at the command prompt; ip- routing access>list 0<< permit #b 4d int e< ip- networC 4d ip- access>group 0<< out int e1 ip- networC #b int e# ip- networC 'c !hat did these command accomplish" A. 0raffic from network $c destined for network $d will be forwarded out 2thernet!. B. 0raffic from network #c destined for network $d will be forwarded out 2thernet!. C. 0raffic from network 8b destined for network $d will be forwarded out 2thernet!. D. 0raffic from network $d destined for network 8d will be forwarded out 2thernet!. Ans C

0raffic from network 8b destined for network $d will be forwarded out 2thernet!. 0he other interfaces 2" and 28 are not subDect to the access list since they lack the access group statement to link them to access list E!!. +' (he following commands were entered at the command prompt of a 5isco router !hat do they accomplish" access>list 1<<< deny 2e 1#'4 +6.0 1#1# 4 access>list 1<<< permit >1 interface ethernet < ip- networC 2e interface ethernet 1 ip- networC 4a interface serial < ip- networC 1 ip- output>sap>filter 1<<< A. ;ile server advertisements from server e."8#$.%*KE."8"8 will not be forwarded on interface 5!. B. All other 5A' services/ other than file server/ from any source will be forwarded on 5!. C. All other 5A' services/ other than print server/ from any source will be forwarded on 5!. D. 'rint server advertisements from server e."8#$.%*KE."8"8 will not be forwarded on interface 5!. Ans A ( B ;ile server advertisements from server e."8#$.%*KE."8"8 will not be forwarded on interface 5!. All other 5A' services/ other than file server/ from any source will be forwarded on 5!. +4 1ou receive )input filter list is 0<< and output filter list is 0<1) as part of the output from a show interfaces command !hat Cind of traffic are you filtering" A. &'@R5'@ B. 0C'R&' C. >ocal0alk D. DD. Ans+ A Because the access list is numbered in the E!! range/ you are filtering &'@R5'@ traffic.

++ !hich service uses telephone control messages and signals between the transfer points along the way to the called destination" A. 5ignaling 5ystem K 655K7 B. 0ime-division 1ultiple:ing 60D17 C. @.8% D. ;rame relay Ans+ A 5ignaling 5ystem K 655K7 uses telephone control messages and signals between the transfer points along the way to the called destination. 0ime-division 1ultiple:ing 60D17 has information from multiple sources and allocates bandwidth on a single media. Circuit switching uses signaling to determine the call route/ which is a dedicated path between the sender and the receiver. Basic telephone service and &ntegrated 5ervices Digital ,etwork 6&5D,7 use 0D1 circuits. @.8% and ;rame .elay services have information contained in packets or frames to share non-dedicated bandwidth. @.8% avoids delays for call setup. ;rame .elay uses permanent virtual circuits 6'4Cs7. +6 !hich service taCes information from multiple sources and allocates bandwidth on a single media" A. 0ime-division 1ultiple:ing 60D17 B. 5ignaling 5ystem K 655K7 C. @.8% D. ;rame relay Ans A +. !hich three devices can be used to convert the user data from the 7(3 into a form acceptable to the !,B serviceHs facility" A. 1odem B. C59RD59 C. 0AR,0" D. C? 2. 55K Ans A/ B ( C A modem/ C59RD59 6Channel 5ervice 9nitRData 5ervice 9nit7/ or 0AR,0" 60erminal AdapterR,etwork 0ermination "7 can be used to convert the user data from the D02 into a form acceptable to the PA, service-s facility. +0 !hat is the Iuncture at which the 5P3 ends and the local loop portion of the service begins"

A. Demarc B. C? C. >ocal loop D. >ast-mile Ans A 0he demarcation or demarc is the Duncture at which the C'2 ends and the local loop portion of the service begins. 0he C? 6Central ?ffice7 is the nearest point of presence for the provider-s PA, service. 0he local loop or )last-mile) is the cabling that e:tends from the demarc into the PA, service provider-s central office.

+2 1ou can access three forms of !,B services with 5isco routers 6elect the three forms; A. 5witched or relayed services B. &nterface front end to &B1 enterprise data center computers C. 9sing protocols that connect peer-to-peer devices like JD>C or ''' encapsulation. D. &'@R5'@ 2. ,etB29& Ans+ A/ B ( C Cou can access three forms of PA, services with Cisco routers. 5witched or relayed services include @.8%/ ;rame .elay/ and &5D,. An interface front end to &B1 enterprise data center computers includes 5D>C. And/ you can access the services of PA, providers using protocols that connect peer devices such as JD>C and ''' encapsulation. &'@R5'@ and ,etB29& are >A, protocols. 6< 6elect the fields for the 5isco &7A5 protocol; A. ;lag/ Address/ Control B. ;lag/ Address/ Control/ 'rotocol/ >C' 6Code/ &dentifier/ >ength/ Data7/ ;C5/ ;lag C. ;lag/ Address/ Control/ Data/ ;C5/ ;lag D. ;lag/ Address/ Control/ 'roprietary/ Data/ ;C5/ ;lag Ans D 0he Cisco JD>C frame format is ;lag/ Address/ Control 'roprietary/ Data/ ;C5/ ;lag. 0he ''' frame format is ;lag/ Address/ Control/ 'rotocol/ >C' 6Code/ &dentifier/ >ength/

Data7/ ;C5/ ;lag. 0he 5D>C and >A'B format is ;lag/ Address/ Control/ Data/ ;C5/ ;lag. 6elect the physical interfaces that PPP can be configured on a 5isco router; A. Asynchronous serial B. J55& C. &5D, D. 5ynchronous serial Ans A/ B/ C ( D All four of them can carry ''' traffic. J55& is Jigh 5peed 5erial &nterface.

61 6elect the correct statements about PPP and 6AIP for !,B communications" A. ''' uses its ,etwork Control 'rograms 6,C's7 component to encapsulate multiple protocols. B. ''' can only transport 0C'R&' C. 5>&' can only transport 0C'R&'. D. 5>&' uses its ,etwork Control 'rograms 6,C's7 component to encapsulate multiple protocols. Ans A ( C 6# !hich protocol for PPP A5P (AinC 5ontrol Protocol) performs a challenge handshaCe" A. CJA' B. 'A' C. 9D' D. &'@ Ans+ A 6' !hich form of PPP error detection on 5isco routers monitors data dropped on a linC" A. Ouality

B. 1agic ,umber C. 2rror 1onitor D. Droplink Ans+ A 0he Ouality protocol monitors data dropped on a link. 1agic ,umber avoids frame looping. 64 !hich protocol for PPP provides load balancing across multiple linCs" A. 1ultilink 'rotocol 61'7 B. Ouality C. 1agic ,umber D. 5tacker 2. 'redictor Ans A 6+ ,s the system administrator$ you type )ppp authentication chap pap secret) !hich authentication method is used first in setting up a session" A. secret B. 'A' C. CJA' D. '''R5>&' Ans C 66 6elect the compression protocols for PPP" A. 5tac B. 'redictor C. Ouality D. 1agic ,umber Ans+ A ( B 6. !hat are the three phases of PPP session establishment" A. >ink establishment phase B. Authentication phase C. ,etwork layer protocol phase D. Jandshake phase 2. Dial-in phase

Ans A/ B ( C 60 !hat is the default IP4 3thernet encapsulation" A.7 B.7 C.7 D.7 2.7 5,A' Arpa E!8.8 ,ovell-2ther 5A'

Ans D

62 !hat must be true for two Routers running IGRP to communicate their routes" A.7 5ame autonomous system number B.7 Connected using 2thernet only C.7 9se composite metric D7Configured for ''' Ans A .< (he following is partial output from a routing table$ identify the # numbers in the s=uare bracCetsJ H12# 160 1< < 91<<D1'<<: via 1< 1 < 1$ <<;<<;#'$ 3thernet1H A.7 B.7 C.7 D.7 "!! L metric/ "#!! L administrative distance "!! L administrative distance/ "#!! L hop count "!! L administrative distance/ "#!! L metric "!! L hop count/ "#!! L metric

Ans C .1 Identify ' methods used to prevent routing loops" A.7 5plit horizon

B.7 Jolddown timers C.7 'oison reverse D.7 5'; algorithm 2.7 >5'-s Ans A B C .# !hich statement is true regarding full duple-" A.7 Allows for transmission and receiving of data simultaneously B.7 ?nly works in a multipoint configuration C.7 Does not affect the bandwidth D.7 Allows for transmission and receiving of data but not a the same time Ans A ;ull duple: is Dust the opposite of half duple:. &t handles traffic in both directions simultaneously.

.' Identify the switching method that receives the entire frame then dispatches it" A.7 Cut-through B.7 .eceive and forward C.7 5tore and forward D.7 ;ast forward Ans C 5tore and forward switching receives the entire frame before dispatching it. .4 Identify the purpose of I5?P" A.7 B.7 C.7 D.7 Avoiding routing loops 5end error and control messages 0ransporting routing updates Collision detection

Ans B &C1' is used to send error and control messages. 'ing uses &C1' to carry the echorequest and echo-reply. .+ !hich statement is true regarding the user e-ec and privileged e-ec mode" A.7 0he -<- only works in 'rivileged e:ec B.7 0hey are identical C.7 0hey both require the enable password

D.7 9ser e:ec is a subset of the privileged e:ec Ans D 0he user e:ec mode is a subset of the privileged e:ec mode. ?nly a certain number of commands are available at the user e:ec mode. .6 !hich E6I layer end to end communication$ segmentation and re>assembly" A.7 B.7 C.7 D.7 2.7 ;.7 ,etwork 0ransport 'hysical Application Data->ink 'resentation

Ans B >ayer $ the 0ransport layer performs this function.

.. !hat IP command would you use to test the entire IP stacC" A.7 B.7 C.7 D.7 2.7 5tack-test Arp 0elnet 'ing 0race

Ans C Because 0elnet is an application and it resides at the top of the stack it traverses down the stack and up the stack at the receiving end. .0 Identify the # hardware components used to manage andDor configure a router" A.7 B.7 C.7 D.7 Au:iliary port .?1 port 1anagement port Console port

Ans A D 0he 8 hardware ports used to configure the router are the console and au:iliary ports.

.2 !hat is the default bandwidth of a serial connection" A.7 "8!! baud B.7 ".%$$ 1bps 60"7 C.7 "! 1bps D.7 *Npbs Ans B (he default bandwidth is (1 0< Identify # functions of IP4 access>lists" A.7 B.7 C.7 D.7 Control 5A' traffic >imit number of ,ovell servers on a network >imit number of workstations on a network Block &'@ traffic

Ans A D &'@ access lists are used to restrict &'@ traffic and 5A' broadcasts.

01 Identify # &7A5 characteristics" A.7 B.7 C.7 D.7 Default serial encapsulation ?pen standard 5upports 5tacker compression 5upports point-to-point and multipoint

Ans A D JD>C is the default serial encapsulation and supports point-to-point and multipoint. &t is not an open standard and does not support compression. 0# Identify ' IP applications" A.7 B.7 C.7 D.7 2.7 ;.7 A9.' A.' 0elnet 510' D,5 .A.'

Ans C D 2 A.' and A9.' are not part the application layer of the 0C'R&' stack. 510' - 5imple 1ail 0ransfer 'rotocol/ 0elnet/ D,5 - Domain ,ame 5ervices 6name to &' resolution7.

0' Identify ' A,B technologies" A.7 B.7 C.7 D.7 2.7 ;.7 ;DD& JD>C J55& @.8% E!8.# E!8.%

Ans A 2 ; 0he question is asking for # >A, technologies/ JD>C/ J55& and @.8% are all PA, technologies. 04 Identify the 4 that are not A,B technologies" A.7 B.7 C.7 D.7 2.7 ;.7 JD>C ;DD& E!8.% J55& 5D>C ;rame .elay

Ans A D 2 ; E!8.% and ;DD& are >A, technologies

0+ !hich E6I layer supports the communication component of an application" A.7 B.7 C.7 D.7 2.7 ;.7 Data->ink 'hysical 5ession 'resentation Application 0ransport

Ans 2 >ayer K the Application layer performs this function. 06 Identify the length of an IP4 address and itHs components" A.7 B.7 C.7 D.7 E! bits/ $E bits network and #8 bits node #8 bits/ "* bits network and "* bits node ,one of the above E! bits/ #8 bits network and $E bits node

Ans D &'@ address has 8 componentsM network and node. 0he network address is #8 bits and the node is $E bits/ total of E! bits. 0. Identify the administrative distance and appropriate routing protocol" A.7 B.7 C.7 D.7 .&' L 8%%/ &3.' L "!! .&' L "!!/ &3.' L "8! .&' L "/ &3.' L ! .&' L "8!/ &3.' L "!!

Ans D 0he administrative distance for .&' is "8! and &3.' is "!!. 0he lower the AD the better the routing information. 00 !hich E6I layer incorporates the ?,5 address and the AA5" A.7 B.7 C.7 D.7 Data link ,etwork 'hyscial 0ransport

Ans7+ A >ayer 8 the Data->ink layer incorporates the 1AC and >>C sublayers

02 If configuring a 5isco router to connect to a non>5isco router across a 8rame Relay networC$ which encapsulation type would you select" A.7 B.7 C.7 D.7 2.7 O ##a &5D, &20; C&5C? A,5&

Ans C 0here are two types of ;rame .elay encapsulationsM Cisco and &20;. &20; is required when connecting a Cisco to a non-Cisco router. 2< Identify the # items that (5P and F7P share in common" A.7 Both use port numbers to identify upper level applications B.7 ?perate at the ,etwork layer C.7 Both are 0ransport protocols

D.7 Both are reliable communications Ans A C 0C' and 9'D are both layer $ 0ransport protocols and both use port number to identify upper level applications. 21 Identify ' characteristics of IP RIP" A.7 B.7 C.7 D.7 2.7 Distance vector Administrative distance is "8! 'eriodic updates every *! seconds 9ses a composite metric Can load balance

Ans A B 2 &' .&' is a distance vector protocol/ it can load balance up to $ equal cost paths and it-s rating of trustworthiness is "8!. 2# !hich of the following is a layer # device" A.7 B.7 C.7 D.7 5witch .outer .epeater Jub

Ans A A Jub and .epeater are layer " devices. A .outer is a layer # device.

2' Identify the definition of demarcation" A.7 B.7 C.7 D.7 Date in which the PA, service contract e:pires Cabling which e:tends from the PA, service provider to the customer Division of responsibility/ where the C'2 ends and the local loop begins 2quipment which is located at the customer premises

Ans C Demarcation is the point in which responsibility changes hands.

24 Identify the ' Cey features of the 5isco 7iscovery Protocol" A.7 B.7 C.7 D.7 2.7 ?ff by default Pill allow for the discovery of layer # addresses on neighbor routers 4erify connectivity ?pen standard Does not require any layer # protocols to be configured

Ans B C 2 CD' is used for 8 basic reasonsM neighbor connectivity and layer # discovery if configured. &t is proprietary and is on by default. 2+ Identify the ' characteristics of IP4 RIP" A.7 B.7 C.7 D.7 2.7 Distance vector Does not support multiple paths *! second updates Default encapsulation is 5A' 9ses ticks and hop count as a metric

Ans A C 2 &'@ .&' is a distance vector routing protocol/ it does support multiple paths/ the default encapsulation is -novell-ether-/ it uses tick count as a primary metric and hop count as a tie breaker and it sends itSs updates every *! seconds. 26 Identify the access>list range for an e-tended IP access>list" A.7 B.7 C.7 D.7 E!! - E ""!!! - "! "!! - " .

Ans D &' e:tended access-lists use the number range of "!!-"

2. Identify the 4 #+ addressing standard" A.7 B.7 C.7 D.7 @."8" @.8%a &09-" O ##a

Ans A 0he @.8% layer # addressing standards is @."8".

20 Identify ' features of IGRP" A.7 B.7 C.7 D.7 2.7 Composite metric ,ew horizon ;lash updates *! periodic updates 'oison reverse

Ans A C 2 &3.' uses a composite metric made up of bandwidth and delay by default/ it updates every *! seconds and will trigger an update if the topology changes. 22 !here is the bacCup configuration file stored" A.7 B.7 C.7 D.7 .A1 .?1 Console ,4.A1

Ans D ?ne location to store the backup configuration is ,4.A1. 1<< Identify the correct pair of Bovell 3thernet encapsulation and 5isco terminology" A.7 B.7 C.7 D.7 2thernet &&/ 5nap 2thernet E!8.#/ ,ovell-2ther 2thernet 5,A'/ Arpa 2thernet E!8.8/ 5nap

Ans B 0he default &'@ >A, encapsulation is ,ovell-2ther which is E!8.#

1<1 Identify ' characteristics regarding IP access>lists" A.7 B.7 C.7 D.7 2.7 Can be configured as a standard access-list Can be run from another router running &' Can be configured as a named access-list Are the same as &'@ access-lists Can be configured as an e:tended access-list

Ans A C 2 0here are # types of &' access-listsM standard/ e:tended and named. ,amed access-lists can be either standard or e:tended depending on how they are configured. 1<# Identify ' ways in which a router can be configured" A.7 B.7 C.7 D.7 2.7 0;0' ,vram 'ing Console 0race

Ans A B D Changes to the configuration can be entered via the console/ a config stored in ,4.A1 or on a 0;0' server. 0race and ping are tools to verify connectivity. 1<' , traffic light is an e-ample of what type of mechanism" A.7 B.7 C.7 D.7 Collision detection ;low control 5equence numbering ,etwork management

Ans B A 0raffic light is an e:ample of flow control. 1<4 !indowing is a type of" A.7 B.7 C.7 D.7 ,egative acknowledgement Address resolution >ayer transition mechanism ;low control

Ans D Pindowing allow the sender and receiver to dictate how much information that can be received prior to an acknowledgement. &t is a form of flow control.

1<+ Identify the # types of access>list filters that control 6,P traffic" A.7 ,ovell-ether B.7 Arpa C.7 &nput-sap-filter

D.7 .ound-robin 2.7 ?utput-sap-filter Ans C 2 5A'-s can be blocked by 8 methodsM inbound and outbound. 1<6 Identify the ' guidelines for routers in the same autonomous system" A.7 B.7 C.7 D.7 2.7 1ust be configured for &3.' or .&' &nterconnected Assigned the same autonomous system number Configured for the same routing protocol 1ust be same model of router

Ans B C D Autonomous system must be interconnected/ assigned the same A5 F and configured with the same routing protocol. 1<. Identify the hardware component used to store buffers$ tables$ running> configuration etc" A.7 B.7 C.7 D.7 ,4.A1 .?1 .A1 ;lash

Ans C .A1 is the dynamic memory area. .?1 contains the boot strap code/ ,4.A1 contains the startup-config and ;lash contains the &?5. 1<0 Identify ' F7P characteristics" A.7 B.7 C.7 D.7 .eliable communication protocol Applications that use 9D' must incorporate reliability Connection-less oriented &ncorporates no handshaking

Ans B C D 9'D is a layer $ 0ransport protocol. &t is connection-less because it does establish a connection therefore the # step handshake is not needed/ it does ,?0 implement any flow control or acknowledgments. Any application that uses 9D' must incorporate any needed reliability.

1<2 Identify the IP4 standard access>list number range" A.7 B.7 C.7 D.7 2.7 *!! - * "!!! - "! ""!! - " E!! - E .

Ans 2 &'@ standard access-list range is E!!-E

11< !hich E6I layer provides best effort end to end pacCet delivery" A.7 B.7 C.7 D.7 2.7 ;.7 Data->ink 'resentation ,etwork 0ransport 'hysical Application

Ans C >ayer # the ,etwork layer performs this function. 111 Identify the # methods to modify the routers boot se=uence" A.7 5etup program B.7 Boot system commands C.7 .@Boot D.7 Config-register Ans B D -Boot system- command the -config-register- are used to manipulate the boot sequence.

11# Identify the ' pieces of hardware you would not install to prevent broadcasts" A.7 B.7 C.7 D.7 5witch .epeater Bridge .outer

Ans A B C .outer are implemented not only to break up networks into smaller segments but they are used to block broadcasts.

11' Identify # features of PPP P,P authentication" A.7 B.7 C.7 D.7 9sername and password is sent in clear te:t Authentication messages are sent periodically during the connection 1ore secure than CJA' .emote node is control of authentication process

Ans A D ''' 'A' authentication sends the username and passwords in clear te:t and the remote node initiates the authentication process. 114 Identify the switching method that e-amines the destination ?,5 address as the frame is being received then begins forwarding the frame prior to receiving the entire frame" A.7 B.7 C.7 D.7 ;ragment-free 5tore and ;orward Cut-through ;ast forward

Ans C Cut through e:amines the destination 1AC address and begins forwarding the frame prior to receiving the entire frame. 11+ Identify 1 characteristic of R,RP" A.7 B.7 C.7 D.7 &' to 1AC address translation Connectionless delivery of packets Can be used to initiate remote ?R5 load sequence 3enerates error and control messages

Ans C .everse Address .esolution 'rotocol is used to obtain a layer # address if the 1AC address is known which then facilitates the loading of the ?R5. 116 Identify the protocol to test connectivity without configuring any layer ' protocols" A.7 B.7 C.7 D.7 2.7 0C' 'ing &' CD' 0elnet

Ans D CD' can be used to verify connectivity prior to any layer # protocols being configured.

11. A?I operates between the 8rame 6witch and what other device" A.7 B.7 C.7 D.7 C'2 device Another ;rame 5witch @.8% switch ,ovell ;ile 5erver

Ans A >1& stands for local management interface. &t operates between the ;rame .elay switch and the customer equipment. 110 Identify IP4 6,P and itHs purpose" A.7 B.7 C.7 D.7 5onet Access 'ipe - interface to 5onet ring 5ervice Advertising 'rotocol - advertise services 5erver Appletalk 'rotocol - appletalk directory services 5ervice Access 'oint - identify upper layer protocols

Ans B 5A' is an ,ovell protocol to advertise services. 112 Identify the default values that maCe up IGRPHs composite metric" A.7 B.7 C.7 D.7 2.7 Bandwidth >oad .eliability 109 Delay

Ans A 2 &3.' can be configured to use all % within it-s metric. By default it uses bandwidth and delay. 1#< Identify the default serial encapsulation" A.7 &5D, B.7 JD>C C.7 5D>C D.7 ;rame .elay 2.7 '''

Ans B 0he default serial encapsulation is JD>C.

1#1 Identify the purpose of ,RP" A.7 B.7 C.7 D.7 Avoiding routing loops Determining a workstation-s &' address 5ending a directed broadcast Determining a workstation-s 1AC address

Ans D A.' is used to find a devices 1AC address given an &' address. 1## !hat is the purpose of the 7A5I" A.7 B.7 C.7 D.7 &dentifies the remote routers Contained with a E!8.8 frame for routing purposes 9sed with ''' during authentication &dentifies the '4C in a ;rame .elay network

Ans D D>C& stands for Data >ink Connection &dentifier. &t identifies the local '4C. 1#' Identify ' characteristics of the BetworC layer (E6I layer ')" A.7 B.7 C.7 D.7 2.7 Connection oriented 'ath determination 5upports multiple:ing 1anages sessions 'acket forwarding

Ans B C 2 0he network layer is responsible for routing which entails learning the paths/ selecting the best path and forwarding the packet. Because it services multiple layer $ protocols it multiple:es. 1#4 Identify ' characteristics of switches" A.7 &ncrease available bandwidth

B.7 C.7 D.7 2.7

Decrease broadcast traffic 5upport full duple: in a multipoint topology 1ake forwarding decision using 1AC address Create collision domains

Ans A D 2 5witches operate at layer 8. 0hey increase bandwidth by reducing the number of devices sharing the media. 0hey isolate collisions. >ike a bridge they forward traffic based upon layer 8 addressR 1AC address.

1#+ !hich E6I layer handles physical address$ networC topology" A.7 B.7 C.7 D.7 2.7 ;.7 'resentation 'hysical 0ransport Application Data->ink ,etwork

Ans 2 >ayer 8 the Data->ink layer performs this function. 1#6 Identify # reasons for disabling 57P" A.7 B.7 C.7 D.7 &f the router is not configured for .&' 5ave bandwidth by eliminating overhead &f the router is configured for Appletalk Phen connected to a non-Cisco router

Ans B D CD' can be disabled here are a couple of reasons. Connecting a Cisco router to a nonCisco router. Don-t want to e:change CD' information to save bandwidth. 1#. Identify ' characteristics of I67B" A.7 B.7 C.7 D.7 2.7 0ransports voice and data 0ransports voice only 5upport both B.& and '.& .uns over e:isting phone lines 5ame as @.8%

Ans A C D &5D, supports voice/ data/ and video. &t runs over e:isting phone lines and supports "8EN 6B.&7 and 0" 6'.&7.

1#0 Identify the ' characteristics of IGRP" A.7 B.7 C.7 D.7 2.7 9ses hop count as a metric 5upports multiple unequal paths Administrative distance is "!! Configured with an Autonomous system number >ink state

Ans B C D &3.' is a distance vector routing protocol/ it-s degree of trustworthiness is "!!/ it can support up to * un-equal paths and must be configured with an autonomous system number.

1#2 Identify # features of PPP 5&,P authentication" A.7 B.7 C.7 D.7 9sername and password is sent in clear te:t Authentication messages are sent periodically during the connection >ess secure then 'A' >ocal router -challenges- the remote router

Ans B D ''' CJA' authentication message are sent periodically during the connection by challenging the other end of the connection. &t is more secure than 'A' and passwords and username are encrypted. 1'< Identify the default IP4 serial encapsulation" A.7 ,ovell-2ther B.7 5D>C C.7 5,A' D.7 JD>C Ans D 0he default &'@ serial encapsulation is JD>C. 1'1 Identify the hardware component that stores the bacCup configuration" A.7 B.7 C.7 D.7 .A1 ,4.A1 ;lash .?1

Ans B

,4.A1 contains the backup config. .A1 is the dynamic memory area/ .?1 contains the boot strap code and ;lash contains the &?5. 1'# Identify the e-tended IP access>list number range" A.7 B.7 C.7 D.7 *!! - * "!! "!! - " .

Ans D 0he e:tended &' access-list range is "!!-"

1'' Identify ' 8ast 3thernet technologies" A.7 "!! Base ;ast2ther B.7 "!! Base ;@ C.7 "!! Base 0$ D.7 "!! Base 0@ Ans B C D "!! Base;ast2ther is false. "!! Base ;@/ 0@ and 0$ are all valid.

1'4 Identify the E6I layer which is responsible for end>to>end connections" A.7 B.7 C.7 D.7 2.7 ,etwork 0ransport 5ession Data link 0C'

Ans B >ayer $ is the 0ransport layer and is responsible for end-to-end connections. 1'+ Identify the # characteristics regarding ?,5 addresses" A.7 B.7 C.7 D.7 Contains a network portion and host portion Always assigned by 5ystem Administrator $E bits long Contains a vendor code and serial number

Ans C D 1AC addresses are assigned by the vendor. 2ach 1AC address is $E bits long and made up of 8$ bits vendor code and 8$ bits serial number.

1'6 Identify the number range for IP4 6,P filters" A.7 !! B.7 "!!! - "! C.7 E!! -E D.7 "!! - " Ans B 0he &'@ 5A' filtering range is "!!!-"! 1'. !hat is the purpose of ,RP" A.7 B.7 C.7 D.7 &' to host name resolution Jost name to &' address resolution 1ac to &' address resolution &' to 1ac address resolution .

Ans D Address .esolution 'rotocol resolves the 1AC address if the &' address is known. &t is a layer # protocol.

1'0 !hich E6I layer establishes$ maintains and terminates sessions between hosts" A.7 B.7 C.7 D.7 2.7 ;.7 Application 'hysical Data->ink 'resentation ,etwork 5ession

Ans ; >ayer % the 5ession layer performs this function. 1'2 !hich statement is true regarding ,dministrative distance" A.7 B.7 C.7 D.7 &t is a metric ,umber of hops between two routers 0rustworthiness of the routing information .&' Administrative distance is "!!

Ans C

Administrative distance is rating of trustworthiness of the routing information. 0he lower the AD the better the information. 14< Identify the purpose of the Ping command" A.7 B.7 C.7 D.7 5hare routing information with a neighbor router 0ransmit user data when buffers are full 0est connectivity at layer # 0est entire protocol stack

Ans C 0he ping command tests layer # connectivity. 141 Identify the order of the + step encapsulation" ". Create the segment 8. Convert the frame to bits #. Create the packet $. Create the frame %. 9ser creates the data A.7 "/8/$/8/% B.7 8/"/#/$/% C.7 %/"/#/$/8 D.7 %/#/$/"/8 Ans C Cisco % step encapsulation. "7 9ser creates Data 87 Data is converted into a segment at layer $ #7 0he segment is converted to packet at layer # $7 0he packet it converted into a frame at layer 8 %7 0he frame is converted into bits at layer " 14# (he 5isco IE6 is stored where" A.7 B.7 C.7 D.7 .?1 CD ;lash ,4.A1

Ans C By default the Cisco &?5 is stored in flash. 14' 6e=uence and acCnowledgement numbers are used for"

A.7 B.7 C.7 D.7

>ayer transitioning ;low control 'ort number addressing .eliability

Ans D 0C' uses sequence numbers and acknowledgements to implement reliability. 144 Identify IP4 GB6 and itHs purpose" A.7 B.7 C.7 D.7 3o ,etwork 5erver - sends a print Dob to a network server 3et ,earest 5erver - locate the nearest server 3uaranteed ,etwork 5ervices - allocates resources to users 3et ,otes 5erver - locates Domino 5erver

Ans B 3,5 stands for 3et ,earest 5erver/ initiated by a workstation. 14+ Identify the true statement regarding subnetting" A.7 B.7 C.7 D.7 Allows for more host address Borrow bits from the network portion of the address Allows for unlimited number of networks Borrow bits from the host portion of the address

Ans D 5ubnetting involves borrowing bits for the host portion of the address to be used to subnet addressing.

146 Inverse ,RP serves what purpose" A.7 B.7 C.7 D.7 1ethod for a local router to introduce itself to the remote end of the connection Broadcast a routing table update &dentify 1AC addresses if the &' address is known 5ent every "! seconds used to verify the ;rame 5witch is still active

Ans A &nverse A.' operates in a ;rame .elay network so the two end points can identify themselves to each other. 14. Identify ' characteristics of a ?,5 address"

A.7 B.7 C.7 D.7 2.7

Burned into the ,&C $E bits long >ength is #8 bits 9sed to deliver the frame to the end device Contains a network portion and a host portion

Ans A B D 0he 1AC address is $E bits long not #8. &t does ,?0 contain a network and host portion with the address. &t is used to deliver the frame to the destination device. 140 Identify ' IP routing protocols" A.7 B.7 C.7 D.7 2.7 ;.7 .&' A9.' ?5'; &3.' A.' &C1'

Ans A C D A9.' and &C1' are not routing protocols. 142 Identify the type of routing protocol that e-changes entire routing tables at regular intervals" A.7 B.7 C.7 D.7 >ink state &nterior gateway protocols Appletalk routing Distance vector

Ans D Distance 4ector routing protocols e:change entire routing tables with it-s neighbors. >ink 5tate routing protocols e:change >5'-s to share information regarding the networks they know.

1+< Identify the type of hardware re=uired to connect a (oCen ring networC to an 3thernet networC" A.7 B.7 C.7 D.7 .epeater 0.-2net .outer 0oken .ing to 2thernet translation hub

Ans C

.outers are used to connect dissimilar networks with different access-methods/ like connecting 0oken .ing to 2thernet.

Você também pode gostar